encode_ie() the bound check did not consider that each byte from
the IE causes two bytes to be written into buffer. That could
lead to a kernel oops, but does not allow code injection. This is
now fixed.

Due to the type of this problem it does not trigger another
urgent security bugfix release. v0.9.3 is at the door anyway.